by
This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Hits : 219

Although your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level.This session covers the most important security considerations for programmers as they design their applications:

Object ownership

Adopted authority

Public and private authorities

Command line permission

Client-server considerations

You’ll also learn why auditors are often deemed the programmer’s nemesis, and what it is they really need from you.